Searched refs:BPF_READ (Results 1 – 7 of 7) sorted by relevance
82 if (type != BPF_READ) in bpf_tcp_ca_is_valid_access()104 if (atype == BPF_READ) in bpf_tcp_ca_btf_struct_access()
1375 if (type != BPF_READ) in kprobe_prog_is_valid_access()1484 if (type != BPF_READ) in tp_prog_is_valid_access()1759 if (type != BPF_READ) in raw_tp_prog_is_valid_access()1773 if (type != BPF_READ) in tracing_prog_is_valid_access()1813 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()1836 if (type != BPF_READ) in pe_prog_is_valid_access()
127 return type == BPF_READ && off == 0 && size == sizeof(u32); in lirc_mode2_is_valid_access()
2539 if (type == BPF_READ && !(cap & BPF_MAP_CAN_READ)) { in check_map_access_type()3321 if (atype != BPF_READ) { in check_ptr_to_btf_access()3333 if (atype == BPF_READ && value_regno >= 0) in check_ptr_to_btf_access()3379 if (atype != BPF_READ) { in check_ptr_to_map_access()3432 if (!err && t == BPF_READ && value_regno >= 0) { in check_mem_access()3461 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()3480 if (!err && t == BPF_READ && value_regno >= 0) { in check_mem_access()3534 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()3545 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()3558 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()[all …]
1670 if (type != BPF_READ) in sysctl_is_valid_access()1675 if (type == BPF_READ) { in sysctl_is_valid_access()
7686 return access_type == BPF_READ; in __sock_filter_check_attach_type()7996 if (type == BPF_READ) { in sock_addr_is_valid_access()8027 if (type != BPF_READ) in sock_addr_is_valid_access()8034 if (type == BPF_READ) { in sock_addr_is_valid_access()9998 off % size || type != BPF_READ) in sk_reuseport_is_valid_access()10162 if (type != BPF_READ) in sk_lookup_is_valid_access()
355 BPF_READ = 1, enumerator